Analysis

  • max time kernel
    120s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 10:06

General

  • Target

    B9C8DEE5E0470B21D27B1A70AFE25495.exe

  • Size

    25.5MB

  • MD5

    b9c8dee5e0470b21d27b1a70afe25495

  • SHA1

    955aebc905591be2c45fb95ac689374552455b58

  • SHA256

    04069d6dc8c9b79d04e96c9cd2950a374abe0c2604110c27227f60a851da123d

  • SHA512

    995ea49bdcba082927264e6dca3ac5d45ad8e152a3c9d71b9f63881e10537f866b5f45e1634af5bc1c44fb36fb0ec48b1a0ece866e1f58d14c2dcc46a0c88cf7

  • SSDEEP

    98304:vS4Lhcl+62txet6kccrV00zSO76bgkVB:vS4yA62txY1cc0XOubtVB

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\B9C8DEE5E0470B21D27B1A70AFE25495.exe
    "C:\Users\Admin\AppData\Local\Temp\B9C8DEE5E0470B21D27B1A70AFE25495.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mlfoNJs5e4.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2840
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2616
        • C:\Users\Admin\AppData\Local\Temp\B9C8DEE5E0470B21D27B1A70AFE25495.exe
          "C:\Users\Admin\AppData\Local\Temp\B9C8DEE5E0470B21D27B1A70AFE25495.exe"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1436

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Google\taskhost.exe

      Filesize

      25.5MB

      MD5

      b9c8dee5e0470b21d27b1a70afe25495

      SHA1

      955aebc905591be2c45fb95ac689374552455b58

      SHA256

      04069d6dc8c9b79d04e96c9cd2950a374abe0c2604110c27227f60a851da123d

      SHA512

      995ea49bdcba082927264e6dca3ac5d45ad8e152a3c9d71b9f63881e10537f866b5f45e1634af5bc1c44fb36fb0ec48b1a0ece866e1f58d14c2dcc46a0c88cf7

    • C:\Users\Admin\AppData\Local\Temp\mlfoNJs5e4.bat

      Filesize

      198B

      MD5

      5fb854201bcefa782275f7eb7e052b4c

      SHA1

      dc14150e58844f833e19ddbc189fec79592000ac

      SHA256

      14c39dd74d5ba669bcedd600637c3e209393afe6b0f7fb8290ae7bdbb2c42016

      SHA512

      c555c04b81b3638f71293bf9c8ac425cfbff9f771ad538896e229c56bae7de7583d213d14a0482ccb7da4da2154eb36be39aeb7c10f8112930ee185d7e42f80a

    • memory/1436-69-0x0000000001350000-0x000000000165A000-memory.dmp

      Filesize

      3.0MB

    • memory/2380-19-0x000007FEF5BA0000-0x000007FEF658C000-memory.dmp

      Filesize

      9.9MB

    • memory/2380-12-0x00000000002A0000-0x00000000002B0000-memory.dmp

      Filesize

      64KB

    • memory/2380-6-0x0000000000290000-0x000000000029E000-memory.dmp

      Filesize

      56KB

    • memory/2380-27-0x000007FEF5BA0000-0x000007FEF658C000-memory.dmp

      Filesize

      9.9MB

    • memory/2380-10-0x000007FEF5BA0000-0x000007FEF658C000-memory.dmp

      Filesize

      9.9MB

    • memory/2380-8-0x00000000004E0000-0x00000000004FC000-memory.dmp

      Filesize

      112KB

    • memory/2380-13-0x000007FEF5BA0000-0x000007FEF658C000-memory.dmp

      Filesize

      9.9MB

    • memory/2380-29-0x0000000000D40000-0x0000000000D50000-memory.dmp

      Filesize

      64KB

    • memory/2380-14-0x000007FEF5BA0000-0x000007FEF658C000-memory.dmp

      Filesize

      9.9MB

    • memory/2380-18-0x00000000004C0000-0x00000000004D0000-memory.dmp

      Filesize

      64KB

    • memory/2380-16-0x0000000000D10000-0x0000000000D28000-memory.dmp

      Filesize

      96KB

    • memory/2380-23-0x0000000000D30000-0x0000000000D3E000-memory.dmp

      Filesize

      56KB

    • memory/2380-24-0x000007FEF5BA0000-0x000007FEF658C000-memory.dmp

      Filesize

      9.9MB

    • memory/2380-31-0x0000000000DA0000-0x0000000000DB6000-memory.dmp

      Filesize

      88KB

    • memory/2380-26-0x0000000000D60000-0x0000000000D72000-memory.dmp

      Filesize

      72KB

    • memory/2380-0-0x000007FEF5BA3000-0x000007FEF5BA4000-memory.dmp

      Filesize

      4KB

    • memory/2380-9-0x000007FEF5BA0000-0x000007FEF658C000-memory.dmp

      Filesize

      9.9MB

    • memory/2380-4-0x000007FEF5BA0000-0x000007FEF658C000-memory.dmp

      Filesize

      9.9MB

    • memory/2380-21-0x00000000004D0000-0x00000000004E0000-memory.dmp

      Filesize

      64KB

    • memory/2380-33-0x0000000000E50000-0x0000000000E62000-memory.dmp

      Filesize

      72KB

    • memory/2380-35-0x0000000000D50000-0x0000000000D5E000-memory.dmp

      Filesize

      56KB

    • memory/2380-37-0x0000000000D80000-0x0000000000D90000-memory.dmp

      Filesize

      64KB

    • memory/2380-39-0x0000000000D90000-0x0000000000DA0000-memory.dmp

      Filesize

      64KB

    • memory/2380-41-0x000000001ABC0000-0x000000001AC1A000-memory.dmp

      Filesize

      360KB

    • memory/2380-43-0x0000000000DC0000-0x0000000000DCE000-memory.dmp

      Filesize

      56KB

    • memory/2380-45-0x0000000000E70000-0x0000000000E80000-memory.dmp

      Filesize

      64KB

    • memory/2380-47-0x0000000000E80000-0x0000000000E8E000-memory.dmp

      Filesize

      56KB

    • memory/2380-49-0x000000001AB60000-0x000000001AB78000-memory.dmp

      Filesize

      96KB

    • memory/2380-51-0x0000000000E90000-0x0000000000E9C000-memory.dmp

      Filesize

      48KB

    • memory/2380-3-0x000007FEF5BA0000-0x000007FEF658C000-memory.dmp

      Filesize

      9.9MB

    • memory/2380-2-0x000007FEF5BA0000-0x000007FEF658C000-memory.dmp

      Filesize

      9.9MB

    • memory/2380-68-0x000007FEF5BA0000-0x000007FEF658C000-memory.dmp

      Filesize

      9.9MB

    • memory/2380-1-0x00000000010D0000-0x00000000013DA000-memory.dmp

      Filesize

      3.0MB